Exam 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____ has created decency concerns,because these e-mails often contain explicit language or nudity.

Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
Verified

D

What are some of the causes of health issues related to information technology?

Free
(Essay)
4.9/5
(42)
Correct Answer:
Verified

Work habits can cause some physical problems and so can the work environment in which computers are used-static electricity,inadequate ventilation,poor lighting,dry air,unsuitable furniture,and too few rest breaks.The increasing popularity of touchscreens on smartphones,tablets,and some PCs may result in more stress-related injuries of the users' hands,arms,back,and eyes.

A patent protects product names and identifying marks.

Free
(True/False)
4.9/5
(40)
Correct Answer:
Verified

False

What is being done to lessen consumers' reluctance to make online shopping purchases?

(Essay)
4.7/5
(31)

A _________ is an intellectual property that protects product names and identifying marks.

(Multiple Choice)
4.9/5
(34)

Which of the following is a potential drawback of telecommuting?

(Multiple Choice)
4.9/5
(36)

Copyright laws do not cover online materials.

(True/False)
4.8/5
(39)

In the context of information technology in workplaces,which of the following allows adding new tasks to employees' responsibilities?

(Multiple Choice)
4.9/5
(41)

_____ is registering,selling,or using a domain name to profit from someone else's trademark.

(Multiple Choice)
4.9/5
(37)

In the context of information technology in workplaces,which of the following is an advantage of virtual organizations?

(Multiple Choice)
4.8/5
(42)

In the context of Web and network privacy,an acceptable use policy is _____.

(Multiple Choice)
5.0/5
(35)

Provide an example of job deskilling.

(Essay)
4.9/5
(36)

Which of the following is a benefit of using patents in organizations?

(Multiple Choice)
4.7/5
(40)

Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations.

(True/False)
4.9/5
(30)

_________ organizations are networks of independent companies,suppliers,customers,and manufacturers connected via information technologies so that they can share skills and costs and have access to each other's markets.

(Multiple Choice)
4.9/5
(35)

In the context of privacy issues,unsolicited e-mail sent for advertising purposes is called _________.

(Multiple Choice)
4.8/5
(33)

_________ are small text files with a unique ID tag that are embedded in a Web browser and saved on the user's hard drive.

(Multiple Choice)
5.0/5
(39)

Alfred,a software programmer at Gamma Inc. ,develops a program that spreads Trojan viruses to the organization's network.When Liam,his manager,discovers that Alfred had intentionally spread the virus,he immediately fires Alfred.In this scenario,Liam's behavior is considered _____.

(Multiple Choice)
4.8/5
(42)

Discuss the concept of typosquatting.

(Essay)
4.8/5
(28)

Aaron bought a photo-editing software package for personal use.He makes two copies of the software,in case the original software fails and he needs a backup.In this scenario,Aaron's actions are considered _____.

(Multiple Choice)
4.7/5
(28)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)